Search Header Logo

Sec+ Quiz - 1

Authored by Isabella S

Computers

Professional Development

Used 34+ times

Sec+ Quiz - 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 2 pts

An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).

The hashing method

The encryption method

The registration authority

The certificate authority

The back-end directory source

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?

On-path

Domain hijacking

DNS poisoning

Evil twin

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

Netstat

Ping

ssh

Ipconfig

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?

Lessons learned

Preparation

Detection

Containment

Root cause analysis

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether it is modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?

Check the hash of the installation file

Match the file names

Verify the URL download location

Verify the code-signing certificate

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?

Embedded Python code

Macro-enabled file

Bash scripting

Credential-harvesting website

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?

Snapshot

Differential

Cloud

Full

Incremental

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?